Free online tools to generate, calculate,
convert, format, encode, and play.
 

Open Port Checker

Test whether specific TCP ports are open or closed on a remote host. Enter a hostname or IP address and select ports to check.

Enter a domain name or IP address
Comma-separated port numbers (1 – 65535)
Web (HTTP/S) Common Databases Extended Dev Server
0
Total
0
Open
0
Closed
0
Filtered
Note: Browser-based port checking has limitations. This tool probes ports using WebSocket connections from your browser, meaning the scan originates from your IP address. Results may differ from server-side tools like nmap. Firewalls, CORS policies, and browser security restrictions can affect accuracy. "Filtered" means no response was received within the timeout period.

How It Works

This tool attempts to establish a WebSocket connection to the specified host on each selected port. Based on the browser's response, the tool determines whether a port is likely open, closed, or filtered:

  • Open: The connection attempt receives a response (even a rejection) from the target port, indicating a service is listening. The connection itself is immediately closed after detection.
  • Closed: The connection is actively refused by the remote host, typically indicated by a TCP RST (reset) packet. This means no service is listening on that port.
  • Filtered: No response is received within the timeout period. This usually means a firewall is silently dropping the packets, preventing the scanner from determining whether the port is open or closed.

Understanding Port States

Network ports can be in three general states:

  • Open: A service is actively accepting connections. This is normal for web servers (port 80/443), mail servers (port 25/587), and other network services. However, unnecessary open ports can be security risks.
  • Closed: No service is listening, but the port is reachable. The host actively rejects connection attempts. This confirms the host is online but no application is bound to that port.
  • Filtered: A firewall or security device is blocking access to the port. Packets are silently dropped with no response sent back. This is a common security measure to hide services from port scanners.

Common Ports and Services

Port Service Description
21FTPFile Transfer Protocol
22SSHSecure Shell
25SMTPEmail sending
53DNSDomain Name System
80HTTPWeb traffic
443HTTPSSecure web traffic
3306MySQLDatabase server
5432PostgreSQLDatabase server
8080HTTP AltAlternative HTTP / proxy

Security Considerations

  • Only scan hosts you own or have explicit permission to test
  • Unauthorized port scanning may violate terms of service or local laws
  • Open ports should be regularly audited and unnecessary services disabled
  • Use firewalls to restrict access to only required ports

Related Network Tools



Feedback

Help us improve this page by providing feedback, and include your name/email if you want us to reach back. Thank you in advance.


Share with